The Vulnerability Distribution by Severity report will show you the vulnerability by a severity number
Â
In AMP, go to the?Log Search?screen.
Click on?Visualizations.
Click the?Create new visualization?button.
In the New Visualization pop up, select the?Pie Chart?visualization option.
Choose a source.
In sources select <PARTNER_ACCT_ID>_<CUSTOMER_ACCT>_customer.
Partner accountId may be 1 or another number. Select the source matching the account number in the top right corner of the AMP page or listed on the Account page followed by "_customer".
Log Search will refresh to display the query screen. From here, the visualization can be configured.
One filter will be applied to this visualization:
Click on Add filter
Set the filter up as seen below. You will have to manually type in "ecs-1.5.0-vulnerability in the Value field and click Save
Under metrics this should already be set to Y-axis Count. No change is needed.
One bucket is needed to configure this visualization. Under Buckets, click the?Add?button, making sure to select?Split Slices.
In the Aggregation drop down, select?Terms.
In the?Field?box, enter "vulnerability.severity" or search for it.
Order by, Order and Size should all remain with their default values. Properly configured, the bucket configuration will look like the screenshot below:
When the bucket is configured, click the?Apply Changes?button.
Set the date range for the visualization.
If the range encompasses more than one report, an additional filter with the report id can be added to narrow down the results if desired.
Save the visualization by clicking?Save?in the top left of the screen.
Users can view previous visualizations by clicking?Visualizations?and selecting the desired visualization from the list.
Â
Â
Â
Â
Vulnerability by Host
The Vulnerability by Host report will show you the top vulnerabilities by hostname
Â
In AMP, go to the Log Search screen.
Click on Visualizations.
Click the Create new visualization button.
In the New Visualization pop up, select the Data Table visualization option.
Choose a source.
In sources select <PARTNER_ACCT_ID>_<CUSTOMER_ACCT>_customer.
Partner accountId may be 1 or another number. Select the source matching the account number in the top right corner of the AMP page or listed on the Account page followed by "_customer".
Log Search will refresh to display the query screen. From here, the visualization can be configured.
One filter will be applied to this visualization:
Click on Add filter
Set the filter up as seen below. You will have to manually type in "ecs-1.5.0-vulnerability in the Value field and click Save
Under metrics this should already be set to Y-axis Count. No change is needed.
4 buckets are needed to configure this visualization.
Bucket configuration for Bucket 1
Under Buckets, click the Add button, and select Split Rows.
In the Aggregation drop down, select Terms.
In the Field box, enter "host.ip" or search for it.
Order by, Order and Size should all remain with their default values. Properly configured, the first bucket configuration will look like the screenshot below:
Bucket configuration for Bucket 2
Under Buckets, click the Add button, and select Split Rows.
In the Aggregation drop down, select Terms.
In the Field box, enter "vulnerability.description" or search for it.
Order by, Order and Size should all remain with their default values. Properly configured, the second bucket configuration will look like the screenshot below:
Bucket configuration for Bucket 3
Under Buckets, click the Add button, and select Split table.
In the Aggregation drop down, select Terms.
In the Field box, enter "host.hostname" or search for it.
Order by, Order and Size should all remain with their default values. Properly configured, the third bucket configuration will look like the screenshot below:
Bucket configuration for Bucket 4
Under Buckets, click the Add button, and select Split rows.
In the Aggregation drop down, select Terms.
In the Field box, enter "vulnerability.score.base" or search for it.
Set Order by to "Custom Metric"
Set Aggregation to Count
Order and Size should all remain with their default values. Properly configured, the fourth bucket configuration will look like the screenshot below:
When the buckets are configured, click the Apply Changes button.
Set the date range for the visualization.
If the range encompasses more than one report, an additional filter with the report id can be added to narrow down the results if desired.
Save the visualization by clicking Save in the top left of the screen.
Users can view previous visualizations by clicking Visualizations and selecting the desired visualization from the list.
Â
Â
Â
Â
Vulnerability Distribution by First Found
The Vulnerability Distribution by First Found report will show you the vulnerabilities by the date they were first discovered.
Â
In AMP, go to the Log Search screen.
Click on Visualizations.
Click the Create new visualization button.
In the New Visualization pop up, select the Pie Chart visualization option.
Choose a source.
In sources select <PARTNER_ACCT_ID>_<CUSTOMER_ACCT>_customer.
Partner accountId may be 1 or another number. Select the source matching the customer account number in the top right corner of the AMP page or listed on the Account page followed by "_customer".
Log Search will refresh to display the query screen. From here, the visualization can be configured.
One filter will be applied to this visualization:
Click on Add filter
Set the filter up as seen below. You will have to manually type in "ecs-1.5.0-vulnerability in the Value field and click Save
Under metrics this should already be set to Y-axis Count. No change is needed.
One bucket is needed to configure this visualization. Under Buckets, click the Add button, making sure to select Split Slices.
In the Aggregation drop down, select Date Histogram.
In the Field box, enter "vulnerability.first_found" or search for it.
Set the value in the Minimum interval box to Weekly
A custom label of Week First Found can be added
Properly configured, the bucket configuration will look like the screenshot below:
When the bucket is configured, click the Apply Changes button.
Set the date range for the visualization.
If the range encompasses more than one report, an additional filter with the report id can be added to narrow down the results if desired.
Save the visualization by clicking Save in the top left of the screen.
Users can view previous visualizations by clicking Visualizations and selecting the desired visualization from the list.
Â
Â
Â
Â
Top 5 Hosts by Count of High Severity Vulnerabilities
The Top 5 Hosts by Count of High Severity Vulnerabilities report will show you the top 5 hosts by count of high severity vulnerabilities
Â
Â
Â
Â
Â
Top 5 Hosts by Count of Vulnerabilities
The Top 5 Hosts by Count of Vulnerabilities report will show you the top 5 hosts by count of total vulnerabilities
Â
Â
Â
Â
Â
Â
Top 5 Hosts by Count of Net New Vulnerabilities
The Top 5 Hosts by Count of Net New Vulnerabilities report will show you the top 5 hosts by count of net new vulnerabilities
Â
Â
Â
Â
Â
Â
Vulnerabilities Sorted from First to Last Discovered
The Vulnerabilities Sorted From First to Last Discovered report will show you a data table of all vulnerabilities sorted from first to last by discovered date
Â
Â
Â
Â
Â
Â
Vulnerability Distribution by OS
The Vulnerability Distribution by OS report will show you the vulnerabilities by Operating System type
Â
Â
Â
Â
Â
Â
Count of Vulnerabilities by Report Date
The Count of Vulnerabilities By Report Date report will show you a line graph of vulnerability count by report date
Â
Â
Â
Â
Â
Â
Count of High Severity Vulnerabilities by Report Date
The Count of High Severity Vulnerabilities By Report Date report will show you a line graph of the count of high severity vulnerabilities by date
Â
Â
Â
Â
Â
Â
Count of IDS Events
The Count of IDS Events report will show you a line graph count of IDS events
Â
Â
Â
Â
Â
Â
Top 10 IDS Event Types
The Top 10 IDS Event Types report will show you a data table of the Top 10 types of IDS event
Â
Â
Â
Â
Â
Â
Top 5 Systems by IDS Event Count
The Top 5 Systems By IDS Event Count report will show you a vertical bar graph of the Top 5 systems by the total count of IDS events
Â
Â
Â
Â
Â
Â
Security - IPRM Location
The Security — IPRM Location report will show you a data table with geographic country locations and security event counts coming from each country
Â
Â
Â
Â
Â
Â
Windows Successful Logins
The Windows Successful Logins report will show you a data table listing hostname, timestamp and the message log for successful logins on Windows systems
Â
Â
Â
Â
Â
Â
Windows Failed Logins
The Windows Failed Logins report will show you a data table listing hostname, timestamp and the message log for failed logins on Windows systems
Â
Â
Â
Â
Â
Â
Linux Successful Logins
The Linux Successful Logins report will show you a data table listing hostname, timestamp and the message log for successful logins on Linux systems
Â
Â
Â
Â
Â
Â
Linux Failed Logins
The Linux Failed Logins report will show you a data table listing hostname, timestamp and the message log for failed logins on Linux systems
Â
Â
Â
Â
Â
Â
PCI Flagged Vulnerabilities
Â
Â
Â
Â
Â
Â
CSPM: Failed by Severity
The CSPM: Failed by Severity visualization is a pie chart that displays failed reports by severity.